Linux & IT , Security
IT Security with Red Hat Made Easy
Linux runs the majority of infrastructure today, and Red Hat is one of the most popular distributions. With the daily news of attacks, breaches and vulnerabilities, securing Red Hat infrastructure is a vital task essential to know for every system administrator.
As you transition through the course, you will learn technologies that are key to securing any infrastructure. These technologies include …
Security , Shop
Active Directory Security Configuration & Management
Active Directory is the central piece of most organizations’ identity and authentication infrastructure. Properly securing it from attackers is a critical step in protecting your organization from a costly compromise. From the basics of an AD structure, to specific Group Policy settings to restrict authentication types, this course will take you through the necessary steps to properly secure your AD …
Security , Shop
SANS SEC556: IoT Penetration Testing (PDF-LAB)
SEC556 will familiarize you with common interfaces in IoT devices and recommend a process along with the Internet of Things Attack (IoTA) testing framework to evaluate these devices within many layers of the Open Systems Interconnection (OSI) model. From firmware and network protocol analysis to hardware implementation issues and all the way to application flaws, we will give you …
Shop , Security
Cybersecurity Attack and Defense Fundamentals Specialization
This Specialization can be taken by students, IT professionals, IT managers, career changers, and anyone who seeks a cybersecurity career or aspires to advance their current role. This course is ideal for those entering the cybersecurity workforce, providing foundational, hands-on skills to solve the most common security issues organizations face today.
This 3-course Specialization will help you gain core cybersecurity …
Shop , Security
Building a Career in Cybersecurity
Cybersecurity is an exciting, fast-growing industry. But how do you get started in the field and stand out from the competition? What do you need to fast track your cybersecurity career?
In this video course, industry expert, professor, and bestselling author Yuri Diogenes guides you through the steps toward a successful career in cybersecurity. Learn about the roles and responsibilities of …
Shop , Security
SANS AUD507: Auditing Systems, Applications, and the Cloud (PDF-VID-LAB)
This course is organized specifically to provide a risk-driven method for tackling the enormous task of designing an enterprise security validation program, covering systems, applications, and the cloud. After covering a variety of high-level audit issues and general audit best practices, students will have the opportunity to delve into the technical “how-to” for determining the key controls that can be …
Shop , Security
In-Depth Red Teaming: APT & Adversary Simulation
How would your people respond to a REAL cyber attack? Not just your technology teams, but your financial, legal, operational, and leadership teams too? We build a comprehensive plan with you to test the responses your people have to perceived real-world cyber threats, and make sure you’re prepared when the real time comes.
HOMEPAGE – https://access.maltrak.com/courses/in-depth-red-teaming-apt-adversary-simulation
Original Price: $1,280
Our Price: $30
Shop , Security
Practical Pentesting: featuring Brad Stine
Need to create a pen test final report? In this course, learn how to properly pre-plan and execute a successful pen test following the client’s scope of work.
HOMEPAGE – https://www.itpro.tv/courses/security-skills/practical-pentesting-featuring-brad-stine/
Our Price: $5
Shop , Security
SANS SEC595: Applied Data Science and Machine Learning for Cybersecurity Professionals (PDF-VID-LAB)
SEC595 provides students with a crash-course introduction to practical data science, statistics, probability, and machine learning. The course is structured as a series of short discussions with extensive hands-on labs that help students to develop useful intuitive understandings of how these concepts relate and can be used to solve real-world problems. If you’ve never done anything with data science or …
Security
Showing 82–90 of 530 results